Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:49
Static task
static1
Behavioral task
behavioral1
Sample
6daade6c9590cecbbb5d154117dffac5c5184df61d0baffb22a2eb75a77b9d1a.exe
Resource
win10v2004-20241007-en
General
-
Target
6daade6c9590cecbbb5d154117dffac5c5184df61d0baffb22a2eb75a77b9d1a.exe
-
Size
660KB
-
MD5
6f039ad21a9e788f0d9674b80dfcb8f7
-
SHA1
1f2790c1fd9e0b4019dcbe4385a467b0b21e3a5d
-
SHA256
6daade6c9590cecbbb5d154117dffac5c5184df61d0baffb22a2eb75a77b9d1a
-
SHA512
5bc4cac8b7af3833091e55af519b4c7d7221c3e76cb6c5dd98e7292dc9c6690c7fec0736c83427f9825be662d9fbfa450924eb5f17339284fac398e081fbabe4
-
SSDEEP
12288:DMruy90MSCfF5+gmI08H/miGEZYjBfoeytpYzc2ymSzctT59DQLCs:dyNPfnq8fXZYjBCCw2ymEqls
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr035950.exe healer behavioral1/memory/3200-15-0x0000000000F90000-0x0000000000F9A000-memory.dmp healer -
Healer family
-
Processes:
jr035950.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr035950.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr035950.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr035950.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr035950.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr035950.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr035950.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4576-2105-0x0000000002680000-0x00000000026B2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/2228-2118-0x0000000000E90000-0x0000000000EC0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr733460.exe family_redline behavioral1/memory/4408-2129-0x0000000000F20000-0x0000000000F4E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku218220.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation ku218220.exe -
Executes dropped EXE 5 IoCs
Processes:
ziKo3018.exejr035950.exeku218220.exe1.exelr733460.exepid process 1940 ziKo3018.exe 3200 jr035950.exe 4576 ku218220.exe 2228 1.exe 4408 lr733460.exe -
Processes:
jr035950.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr035950.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
6daade6c9590cecbbb5d154117dffac5c5184df61d0baffb22a2eb75a77b9d1a.exeziKo3018.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6daade6c9590cecbbb5d154117dffac5c5184df61d0baffb22a2eb75a77b9d1a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziKo3018.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5916 4576 WerFault.exe ku218220.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ku218220.exe1.exelr733460.exe6daade6c9590cecbbb5d154117dffac5c5184df61d0baffb22a2eb75a77b9d1a.exeziKo3018.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku218220.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr733460.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6daade6c9590cecbbb5d154117dffac5c5184df61d0baffb22a2eb75a77b9d1a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziKo3018.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr035950.exepid process 3200 jr035950.exe 3200 jr035950.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr035950.exeku218220.exedescription pid process Token: SeDebugPrivilege 3200 jr035950.exe Token: SeDebugPrivilege 4576 ku218220.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
6daade6c9590cecbbb5d154117dffac5c5184df61d0baffb22a2eb75a77b9d1a.exeziKo3018.exeku218220.exedescription pid process target process PID 4092 wrote to memory of 1940 4092 6daade6c9590cecbbb5d154117dffac5c5184df61d0baffb22a2eb75a77b9d1a.exe ziKo3018.exe PID 4092 wrote to memory of 1940 4092 6daade6c9590cecbbb5d154117dffac5c5184df61d0baffb22a2eb75a77b9d1a.exe ziKo3018.exe PID 4092 wrote to memory of 1940 4092 6daade6c9590cecbbb5d154117dffac5c5184df61d0baffb22a2eb75a77b9d1a.exe ziKo3018.exe PID 1940 wrote to memory of 3200 1940 ziKo3018.exe jr035950.exe PID 1940 wrote to memory of 3200 1940 ziKo3018.exe jr035950.exe PID 1940 wrote to memory of 4576 1940 ziKo3018.exe ku218220.exe PID 1940 wrote to memory of 4576 1940 ziKo3018.exe ku218220.exe PID 1940 wrote to memory of 4576 1940 ziKo3018.exe ku218220.exe PID 4576 wrote to memory of 2228 4576 ku218220.exe 1.exe PID 4576 wrote to memory of 2228 4576 ku218220.exe 1.exe PID 4576 wrote to memory of 2228 4576 ku218220.exe 1.exe PID 4092 wrote to memory of 4408 4092 6daade6c9590cecbbb5d154117dffac5c5184df61d0baffb22a2eb75a77b9d1a.exe lr733460.exe PID 4092 wrote to memory of 4408 4092 6daade6c9590cecbbb5d154117dffac5c5184df61d0baffb22a2eb75a77b9d1a.exe lr733460.exe PID 4092 wrote to memory of 4408 4092 6daade6c9590cecbbb5d154117dffac5c5184df61d0baffb22a2eb75a77b9d1a.exe lr733460.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6daade6c9590cecbbb5d154117dffac5c5184df61d0baffb22a2eb75a77b9d1a.exe"C:\Users\Admin\AppData\Local\Temp\6daade6c9590cecbbb5d154117dffac5c5184df61d0baffb22a2eb75a77b9d1a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKo3018.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKo3018.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr035950.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr035950.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku218220.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku218220.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 13844⤵
- Program crash
PID:5916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr733460.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr733460.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4576 -ip 45761⤵PID:872
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5f89adce57505be13dfbbadfdae7e8092
SHA1ce4e36a3f46d75a2105843de3971ac3ae3fb5b51
SHA256903e7931d4ef4b3cef191ca38ca7ada2243205d0ced26da8428975b4c2321e7f
SHA512903ad0dc282f2717485e67cfb4566a9e0c1a73d3fc708b8641724837fcfb26f700bf994dba11a2aad2606cdd993d951a199a80d3568baa516b98edb7fb9ca1c0
-
Filesize
507KB
MD5a0ab61f2ff8680f132e61ce097e0ad24
SHA1eb1ee7d1b11a50cbed6e011d944bf9d4bfd17a08
SHA2564df9cc63d36bc3cb1a09cc2fbc87288f80daa10e46098797c52de923048eb9c2
SHA5121034aee786de52c51ed009f885a7203bcc277fd69b206b7efe0a91d1d8e0fa837d474fc4a815e8166c822f581ce00a1a8f34f9ead79a77a40fb3678b7b00f055
-
Filesize
11KB
MD5e1738d971031e085cf5c3678776c4caa
SHA1612af09e41793427fe84303fb3637f4b86fa2900
SHA25659d0a64584b0e027217454a79f141a072b71cba848163e4c8c417092e21b2443
SHA5122abeb7712cddf74d37ec6d733259af43f1c9d8bca569212ca3b1c1bd40a32484974ec017b93ee27cd2af74c2a2be4acc0816f5808479d9ab94f9875b3881221a
-
Filesize
435KB
MD5712ed76e5470bc91676dfba1747bf7ac
SHA18435318346ff8bba6a7bdb76967428efeae03de8
SHA256ae234ab72f8be6b9a84b74722e7171d05f210713cbbf78592e4e5dca96549f82
SHA51256bfe921de7456e3b86effcd69e5c279fccc9ee661da95f9170129b5076b5eb44b7495402dcd62980c7f793924b577be87422bea41d8f825a9ea073b32189220
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0